Browse Source

江苏工伤的dll

LIJU 4 days ago
parent
commit
541b1760a6

BIN
ThCardReader/bin/x86/Release/EapTesting.exe


BIN
ThCardReader/bin/x86/Release/JSCard.dll


BIN
ThCardReader/bin/x86/Release/JSEapagent.dll


BIN
ThCardReader/bin/x86/Release/JSSiInterface.dll


BIN
ThCardReader/bin/x86/Release/JSSiInterfaceTest.exe


BIN
ThCardReader/bin/x86/Release/JSVerifyLicAuthLayer.dll


BIN
ThCardReader/bin/x86/Release/SSLTest_windows32.exe


BIN
ThCardReader/bin/x86/Release/VerifyLicAuth.dll


BIN
ThCardReader/bin/x86/Release/VerifyLicTesting.exe


+ 232 - 0
ThCardReader/bin/x86/Release/c_rehash.pl

@@ -0,0 +1,232 @@
+#!/usr/bin/env perl
+
+# WARNING: do not edit!
+# Generated by makefile from ..\tools\c_rehash.in
+# Copyright 1999-2018 The OpenSSL Project Authors. All Rights Reserved.
+#
+# Licensed under the OpenSSL license (the "License").  You may not use
+# this file except in compliance with the License.  You can obtain a copy
+# in the file LICENSE in the source distribution or at
+# https://www.openssl.org/source/license.html
+
+# Perl c_rehash script, scan all files in a directory
+# and add symbolic links to their hash values.
+
+my $dir = "";
+my $prefix = "";
+
+my $errorcount = 0;
+my $openssl = $ENV{OPENSSL} || "openssl";
+my $pwd;
+my $x509hash = "-subject_hash";
+my $crlhash = "-hash";
+my $verbose = 0;
+my $symlink_exists=eval {symlink("",""); 1};
+my $removelinks = 1;
+
+##  Parse flags.
+while ( $ARGV[0] =~ /^-/ ) {
+    my $flag = shift @ARGV;
+    last if ( $flag eq '--');
+    if ( $flag eq '-old') {
+	    $x509hash = "-subject_hash_old";
+	    $crlhash = "-hash_old";
+    } elsif ( $flag eq '-h' || $flag eq '-help' ) {
+	    help();
+    } elsif ( $flag eq '-n' ) {
+	    $removelinks = 0;
+    } elsif ( $flag eq '-v' ) {
+	    $verbose++;
+    }
+    else {
+	    print STDERR "Usage error; try -h.\n";
+	    exit 1;
+    }
+}
+
+sub help {
+	print "Usage: c_rehash [-old] [-h] [-help] [-v] [dirs...]\n";
+	print "   -old use old-style digest\n";
+	print "   -h or -help print this help text\n";
+	print "   -v print files removed and linked\n";
+	exit 0;
+}
+
+eval "require Cwd";
+if (defined(&Cwd::getcwd)) {
+	$pwd=Cwd::getcwd();
+} else {
+	$pwd=`pwd`;
+	chomp($pwd);
+}
+
+# DOS/Win32 or Unix delimiter?  Prefix our installdir, then search.
+my $path_delim = ($pwd =~ /^[a-z]\:/i) ? ';' : ':';
+$ENV{PATH} = "$prefix/bin" . ($ENV{PATH} ? $path_delim . $ENV{PATH} : "");
+
+if (! -x $openssl) {
+	my $found = 0;
+	foreach (split /$path_delim/, $ENV{PATH}) {
+		if (-x "$_/$openssl") {
+			$found = 1;
+			$openssl = "$_/$openssl";
+			last;
+		}	
+	}
+	if ($found == 0) {
+		print STDERR "c_rehash: rehashing skipped ('openssl' program not available)\n";
+		exit 0;
+	}
+}
+
+if (@ARGV) {
+	@dirlist = @ARGV;
+} elsif ($ENV{SSL_CERT_DIR}) {
+	@dirlist = split /$path_delim/, $ENV{SSL_CERT_DIR};
+} else {
+	$dirlist[0] = "$dir/certs";
+}
+
+if (-d $dirlist[0]) {
+	chdir $dirlist[0];
+	$openssl="$pwd/$openssl" if (!-x $openssl);
+	chdir $pwd;
+}
+
+foreach (@dirlist) {
+	if (-d $_ ) {
+            if ( -w $_) {
+		hash_dir($_);
+            } else {
+                print "Skipping $_, can't write\n";
+                $errorcount++;
+            }
+	}
+}
+exit($errorcount);
+
+sub hash_dir {
+	my %hashlist;
+	print "Doing $_[0]\n";
+	chdir $_[0];
+	opendir(DIR, ".");
+	my @flist = sort readdir(DIR);
+	closedir DIR;
+	if ( $removelinks ) {
+		# Delete any existing symbolic links
+		foreach (grep {/^[\da-f]+\.r{0,1}\d+$/} @flist) {
+			if (-l $_) {
+				print "unlink $_" if $verbose;
+				unlink $_ || warn "Can't unlink $_, $!\n";
+			}
+		}
+	}
+	FILE: foreach $fname (grep {/\.(pem)|(crt)|(cer)|(crl)$/} @flist) {
+		# Check to see if certificates and/or CRLs present.
+		my ($cert, $crl) = check_file($fname);
+		if (!$cert && !$crl) {
+			print STDERR "WARNING: $fname does not contain a certificate or CRL: skipping\n";
+			next;
+		}
+		link_hash_cert($fname) if ($cert);
+		link_hash_crl($fname) if ($crl);
+	}
+}
+
+sub check_file {
+	my ($is_cert, $is_crl) = (0,0);
+	my $fname = $_[0];
+	open IN, $fname;
+	while(<IN>) {
+		if (/^-----BEGIN (.*)-----/) {
+			my $hdr = $1;
+			if ($hdr =~ /^(X509 |TRUSTED |)CERTIFICATE$/) {
+				$is_cert = 1;
+				last if ($is_crl);
+			} elsif ($hdr eq "X509 CRL") {
+				$is_crl = 1;
+				last if ($is_cert);
+			}
+		}
+	}
+	close IN;
+	return ($is_cert, $is_crl);
+}
+
+
+# Link a certificate to its subject name hash value, each hash is of
+# the form <hash>.<n> where n is an integer. If the hash value already exists
+# then we need to up the value of n, unless its a duplicate in which
+# case we skip the link. We check for duplicates by comparing the
+# certificate fingerprints
+
+sub link_hash_cert {
+		my $fname = $_[0];
+		$fname =~ s/'/'\\''/g;
+		my ($hash, $fprint) = `"$openssl" x509 $x509hash -fingerprint -noout -in "$fname"`;
+		chomp $hash;
+		chomp $fprint;
+		$fprint =~ s/^.*=//;
+		$fprint =~ tr/://d;
+		my $suffix = 0;
+		# Search for an unused hash filename
+		while(exists $hashlist{"$hash.$suffix"}) {
+			# Hash matches: if fingerprint matches its a duplicate cert
+			if ($hashlist{"$hash.$suffix"} eq $fprint) {
+				print STDERR "WARNING: Skipping duplicate certificate $fname\n";
+				return;
+			}
+			$suffix++;
+		}
+		$hash .= ".$suffix";
+		if ($symlink_exists) {
+			print "link $fname -> $hash\n" if $verbose;
+			symlink $fname, $hash || warn "Can't symlink, $!";
+		} else {
+			print "copy $fname -> $hash\n" if $verbose;
+                        if (open($in, "<", $fname)) {
+                            if (open($out,">", $hash)) {
+                                print $out $_ while (<$in>);
+                                close $out;
+                            } else {
+                                warn "can't open $hash for write, $!";
+                            }
+                            close $in;
+                        } else {
+                            warn "can't open $fname for read, $!";
+                        }
+		}
+		$hashlist{$hash} = $fprint;
+}
+
+# Same as above except for a CRL. CRL links are of the form <hash>.r<n>
+
+sub link_hash_crl {
+		my $fname = $_[0];
+		$fname =~ s/'/'\\''/g;
+		my ($hash, $fprint) = `"$openssl" crl $crlhash -fingerprint -noout -in '$fname'`;
+		chomp $hash;
+		chomp $fprint;
+		$fprint =~ s/^.*=//;
+		$fprint =~ tr/://d;
+		my $suffix = 0;
+		# Search for an unused hash filename
+		while(exists $hashlist{"$hash.r$suffix"}) {
+			# Hash matches: if fingerprint matches its a duplicate cert
+			if ($hashlist{"$hash.r$suffix"} eq $fprint) {
+				print STDERR "WARNING: Skipping duplicate CRL $fname\n";
+				return;
+			}
+			$suffix++;
+		}
+		$hash .= ".r$suffix";
+		if ($symlink_exists) {
+			print "link $fname -> $hash\n" if $verbose;
+			symlink $fname, $hash || warn "Can't symlink, $!";
+		} else {
+			print "cp $fname -> $hash\n" if $verbose;
+			system ("cp", $fname, $hash);
+                        warn "Can't copy, $!" if ($? >> 8) != 0;
+		}
+		$hashlist{$hash} = $fprint;
+}

+ 48 - 0
ThCardReader/bin/x86/Release/certs/sm2_256/sm2_root.pem

@@ -0,0 +1,48 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----

BIN
ThCardReader/bin/x86/Release/enhisif.dll


+ 24 - 0
ThCardReader/bin/x86/Release/jseapagent.ini

@@ -0,0 +1,24 @@
+[SEND_ROUTE]
+SSL=Y
+[HTTP_SERVER]
+default.Host=10.79.159.21
+default.Port=8080
+default.WebAppName=/api/siInterfaceApi/execute?bcpBasicAuth=NjAwMDAwMTE4ODAzNDA5NDo2MDAwMDAyMDIxMTkzNjE1OjhhY2ZiMGIyNzUxYmQ0NDMwMTc1MWQwNDEyMmYwMDA3
+
+default.TimeOut=350
+default.CHARSET=UTF-8
+
+[HEADER_INFO]
+ApiCode=399-0041
+ServiceCode=301-0001
+SourceCode=32-001-01
+Version=1.0
+
+[SSL_SERVER]
+IP=10.79.197.30
+DOMAIN=ywxtpt.app.jshrss
+PORT=1443
+CHARSET=UTF-8
+ENGINE=N
+PRIVATEKEY=N
+[END]

File diff suppressed because it is too large
+ 0 - 0
ThCardReader/bin/x86/Release/jslicense.ini


BIN
ThCardReader/bin/x86/Release/libcrypto-sw.dll


BIN
ThCardReader/bin/x86/Release/libcrypto-sw.pdb


BIN
ThCardReader/bin/x86/Release/libssl-sw.dll


BIN
ThCardReader/bin/x86/Release/libssl-sw.pdb


BIN
ThCardReader/bin/x86/Release/openssl.pdb


BIN
ThCardReader/bin/x86/Release/swssl.exe


Some files were not shown because too many files changed in this diff